Information and Computer Security: Volume 28 Issue 2

Subjects:

Table of contents

Enhancing cyber security behavior: an internal social marketing approach

Hiep Cong Pham, Linda Brennan, Lukas Parker, Nhat Tram Phan-Le, Irfan Ulhaq, Mathews Zanda Nkhoma, Minh Nhat Nguyen

Understanding the behavioral change process of system users to adopt safe security practices is important to the success of an organization’s cybersecurity program. This study…

1478

The willingness to disclose personal information: Trade-off between privacy concerns and benefits

Ibrahim M. Al-Jabri, Mustafa I. Eid, Amer Abed

Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate and hinder…

1485

Automated data-driven profiling: threats for group privacy

Paola Mavriki, Maria Karyda

User profiling with big data raises significant issues regarding privacy. Privacy studies typically focus on individual privacy; however, in the era of big data analytics, users…

Cloud computing in SMEs: towards delegation of the CIO role

Wafa Bouaynaya

The purpose of this paper is to contribute to a growing body of research on information systems security, by studying open source alternatives for cloud computing. Several…

The hunt for computerized support in information security policy management: A literature review

Elham Rostami, Fredrik Karlsson, Ella Kolkowska

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been…

1427

What do we know about information security governance?: “From the basement to the boardroom”: towards digital security governance

Stef Schinagl, Abbas Shahim

This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate…

11651

Cybersecurity behaviour of smartphone users in India: an empirical analysis

Pintu Shah, Anuja Agarwal

For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less…

1322
Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell